Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Select one of the following questions and clearly identify which question you are answering. Provide the single best answer for that question together with a
Select one of the following questions and clearly identify which question you are answering. Provide the single best answer for that question together with a 100-word explanation why you selected the answer. Reply to two other students with your thoughts on their answers to their selected questions.
- Your company has several UNIX servers on its network. These servers were configured before your employment in the company and prior to the company establishing a server security policy. You are concerned about the root account on these UNIX servers. Which security guidelines should you follow?
- Disable the root account.
- Only allow root login via the remote shell.
- Only allow root login via the local console.
- Limit administrator access to the root account.
- Your company has several UNIX servers on its network. An IT co-worker has notified you that he noticed that all of these UNIX servers have an /etc./shadow file. What is the best description of the purpose of this file?
-
- To store password security policy settings
- To store user passwords in a protected format
- To store user passwords
- To store the root password
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started